PMDF System Manager's Guide


Previous Contents Index


Glossary

Glossary

APOP: RFC 1939, POP3, defines the APOP command. This is an alternate method for authenticating the user which, rather than sending the username and password in the clear over the network, encodes the password.

Authentication mechanism: An authentication mechanism is a particular method for a client to prove its identity to a server. APOP, PLAIN and CRAM-MD5 (mechanism names are as defined by RFC 2222, SASL), are examples of authentication mechanisms. Another, but non-standard, mechanism is the LOGIN mechanism. For discussions of particular mechanisms, see for instance RFC 2195 documenting CRAM-MD5, and RFC 1939 documenting APOP.

Authentication source: An authentication source is a file, database, interface to an LDAP directory, etc., accessible to the server wherein are stored authentication verifiers for users. The system password file, PMDF user profile passwords (PMDF MessageStore or PMDF popstore profile passwords) and the PMDF password database are examples of authentication sources.

Authentication verifier: An authentication verifier (e.g., password) is stored on the server and contains information used to verify a user's identity. The format of the authentication verifier can restrict which mechanisms can be used. The term authentication verifier is preferred in place of password, since while passwords are the most common instance of authentication verifiers, an authentication verifier could also be something like a certificate in an LDAP directory or the like; usually, however, one can think "password" wherever one sees "authentication verifier".

Certificate: In the security context, a certificate is a guarantee, signed by some trusted authority, that says that a piece of information is what it purports to be. For instance, certificates are often needed and encountered when using a public key pair.

Certificate Authority: A Certificate Authority is a recognized, generally well-trusted authority that is willing to sign other organization's certificates. A Certificate Authority has a well-published certificate (containing their public key) that other organizations can use to verify the Certificate Authority's signature on other certificates. Assuming that an organization trusts the Certificate Authority, this then gives them confidence in certificates that include a valid signature from the Certificate Authority. Verisign, Inc., and Thawte Consulting are two of the better known commercial Certificate Authorities. Large corporations will sometimes, for their own internal purposes, act as their own Certificate Authority.

Certificate request: A certificate request is a special form of a site's public key suitable for signing by a Certificate Authority. The signing of a certificate request generates a certificate.

Channel block: The definition of a PMDF channel appearing in the PMDF configuration file is called a channel block; see Section 2.3.2.

Channel keyword: A large number of channel keywords are available for use in PMDF channel definitions (channel blocks) to control and modify the action of the channel to which a keyword is applied; see Section 2.3.4.

Channel program: Loosely speaking, any program which enqueues or dequeues messages to or from PMDF's message queues.

Common name: In X.500 terminology, the common name or commonName or CN attribute is a multi-valued attribute that describes an entry; typically it is something like a person's name, "First Middle Last", etc. The term is also used in other contexts, such as in a certificate, and in non-X.500 directories, especially LDAP directories.

CRAM-MD5: RFC 2195, IMAP/POP AUTHorize Extension, defines the CRAM-MD5 mechanism (Challenge-Response Authentication Mechanism using the MD5 digest algorithm) for authenticating using an encoded password, rather than sending the user's password in the clear over the network.

Dequeue: The act of removing a mail message from PMDF's message queues.

Distinguished name: In X.500 terminology, the distinguished name or distinguishedName or DN attribute uniquely identifies an object in the Directory Information Tree. The term is also used in other contexts, such as in a certificate, and in non-X.500 directories, especially LDAP directories, and hence is a much used term in PMDF-DIRSYNC.

Enqueue: The act of submitting for transmission a mail message to PMDF.

Envelope: The message's transport layer To: and From: addressing information is contained in the message envelope.

GUI: A Graphics User Interface or GUI is a visually oriented interface, such as typically seen on Mac or Windows systems.

IETF: The IETF, Internet Engineering Task Force, is the Internet standards body.

Keyword: See Channel keyword.

Private key: A private key is the secret half of a public key pair.

Public key: A public key is the published half of a public key pair.

Public key encryption: So-called public key encryption refers to encryption and decryption using a pair of keys, referred to as a public key pair. One key is referred to as the public key, and is generally published (visible to the outside world); the other key is referred to as the private key and is secret and known only to the owner of the public key pair. User A can encrypt data to send to user B using user B's public key, and then only user B will be able to decrypt the data by using user B's own private key.

Public key pair: Public key encryption uses pairs of keys, one kept secret and one published (made accessible) to the outside world. What the public key encrypts, the private key decrypts, and vice-versa. The keys together are called a public key pair.

Mailbox filter: Mailbox filters are rules for individual users, for PMDF channels, or for the PMDF system specifying screening of incoming messages; see Section 16.2.

Mapping table: Many components of PMDF make use of one or another mapping table: a table mapping input strings to output strings. All PMDF mapping tables are stored in the PMDF mapping file; see Chapter 5.

Master channel program: Any program which enqueues messages to PMDF's message queues.

MIME: See RFCs 2045--2049.

MTA: Message transfer agent; e.g., PMDF.

MUA: Mail user agent; see UA.

NOTARY: See RFCs 1891--1894.

RFC: Request For Comments; the Internet's method of publishing documents.

RFC 821: RFC 821, written by Jonathan Postel, defines SMTP, the Simple Mail Transfer Protocol, used to transfer messages over the Internet.

RFC 822: RFC 822, written by David Crocker, is the Internet standards document entitled Standard for the Format of ARPA Internet Text Messages. Messages in PMDF's message queues conform to this standard; i.e., RFC 822 is the format which PMDF uses internally.

RFC 1123: RFC 1123, edited by Robert Braden, is the Internet standards document entitled Internet Host Requirements --- Application and Support. PMDF adheres to the requirements put forth by this document.

RFC 1566: RFC 1566, sometimes referred to as MADMAN, written by Steve Kille and Ned Freed, is the Internet standards track protocol entitled Mail Monitoring MIB. PMDF accumulates the necessary message traffic statistics needed for this MIB. The concept of "group" used in the MIB is identified with a PMDF channel. The PMDF_get_channel_stats routine can be used to access the messages traffic statistics, referred to as channel statistics.

RFCs 1891--1894: RFCs 1891--1894, sometimes referred to as NOTARY, written by Keith Moore and Greg Vaudreuil, are the Internet standards track documents for the format and handling of notification messages.

RFCs 2045--2049: RFCs 2045--2049, commonly referred to as MIME, written by Nathaniel Borenstein and Ned Freed, are the Internet standards track documents describing the format of Internet message bodies. PMDF uses the specifications laid out in this document when forming multipart messages, encoded messages, etc. Note that RFCs 2045--2049 replaced RFCs 1521--1522 and 1431, previous drafts of MIME.

RFC 2222: RFC 2222, SASL (Simple Authentication and Security Layer), describes methods for adding authentication mechanisms, encryption, and data integrity checking to protocols such as POP, IMAP, and SMTP.

RFC 2246: RFC 2246 defined TLS (Transport Layer Security), a protocol for providing data integrity and encryption for reliable data connections (such as TCP).

SASL: See RFC 2222.

Security rule set: In the PMDF security configuration file context, a security rule set is a set of rules determining which authentication mechanisms and sources are permitted or used by the server. In PMDF the PORT_ACCESS mapping is used to determine the security rule set to apply to an incoming connection, based on IP addresses and ports.

Sign: In the context of a TLS certificate, to say that a certificate is signed means that a Certificate Authority has generated a hash of the contents of the certificate and used their own private key to encrypt that hash and then appended that encrypted hash to the original certificate. Then other sites that want to check on the validity of your certificate can use the Certificate Authority's well-published certificate (containing the Certificate Authority's public key) to verify the hash and thus verify that the contents of your supposed certificate match the contents that were seen and signed off on by the Certificate Authority. Assuming that the other site trusts the Certificate Authority, this then gives them confidence in your certificate.

Slave channel program: Any program which dequeues messages from PMDF's message queues.

SMTP (Simple Mail Transfer Protocol): See RFC 821.

SSL (Secure Sockets Layer): This protocol was developed by Netscape and has been superseded by TLS which is backward compatible with SSL.

Symmetric encryption: When encryption is done such that the same key encrypts and decrypts the data, it is said that the encryption is symmetric. This does require that the key that is used to encrypt the data must be given to the decryption side in a secure fashion.

TLS (Transport Layer Security): See RFC 2246.

UA: User agent; e.g., the VMS MAIL utility or the Pine utility.

User domain: A user domain is an independent set of users known to the server. This is useful, for example, if a server wants to support multiple sets of users possibly with overlapping user names. In PMDF the PORT_ACCESS mapping is used to determine the user domain for each incoming connection, based on IP addresses and ports. Currently only the PMDF popstore authentication source supports multiple user domains; for all other sources, or if no user domain is explicitly specified in the PORT_ACCESS mapping, the default user domain is assumed. Currently only the PMDF POP server supports authentication using a user domain.

Virtual domain: When a system hosts multiple domain names, it is considered to be supporting virtual domains---pseudodomain names that do not correspond to a system dedicated to only that domain name. PMDF's directory channel, etc., and user domain support for PMDF popstore users, are examples of PMDF features helpful in supporting virtual domains.


Index Contents